Re: [v6ops] Off topic: Teredo sunset -- Re: [EXTERNAL] Re: Improving ND security

Joseph Touch <touch@strayalpha.com> Mon, 03 August 2020 22:52 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07D1E3A1144 for <v6ops@ietfa.amsl.com>; Mon, 3 Aug 2020 15:52:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.454
X-Spam-Level:
X-Spam-Status: No, score=0.454 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.652, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sKFAQaEfXWno for <v6ops@ietfa.amsl.com>; Mon, 3 Aug 2020 15:52:51 -0700 (PDT)
Received: from server217-4.web-hosting.com (server217-4.web-hosting.com [198.54.116.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D48AF3A1143 for <v6ops@ietf.org>; Mon, 3 Aug 2020 15:52:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id: Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version: Content-Type:Sender:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=58GpQPUG0mSUpoy92pYC62Xt8PcU3JFkdYRLmzAyW5Q=; b=Tvisef+o1HCEY1QKodPGa9yyM pySaoQq52fZYOS9jnAAVYFPZpG2DVpHZMMzwRuTf6HaZQ1X29lj77MOeA+puzIZpmvP/u+KC6wkqA l8eYNImyLdWmRQ7NGlmGTl553rUmpqsEA6KwFA6BWfnGZjca3EbkOYhuBDzdix7BOJmBCrNtKcJCV 1/Q5ST/cwDVhQF0GaZDRqcwpTPBHZ9bvpcy3qh3f5xVWEsRXqq+M9jNFZNW6v2KQrkxB2YTiHB7DW 6gk3WUOTn5npZvO2cjRFT5avDVpdNU+V6Y0XHHB+w1aQJeyBm2olu6KHmGFipqAnHpXleWRxiJlGN bZrjE/sWQ==;
Received: from cpe-172-250-225-198.socal.res.rr.com ([172.250.225.198]:63112 helo=[192.168.1.14]) by server217.web-hosting.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from <touch@strayalpha.com>) id 1k2jJx-0044mx-8F; Mon, 03 Aug 2020 18:52:47 -0400
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
From: Joseph Touch <touch@strayalpha.com>
In-Reply-To: <02d2c251ce2f45d388725d11ebd85a6f@boeing.com>
Date: Mon, 03 Aug 2020 15:52:40 -0700
Cc: Lencse Gábor <lencse@hit.bme.hu>, "v6ops@ietf.org" <v6ops@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <ABAAFF44-F41E-4AF3-AB58-14528C7B5A73@strayalpha.com>
References: <d5c245f216c3409f826f8132e532a882@boeing.com> <860E06E2-2650-4AAE-AD33-D4D12B0290DC@fugue.com> <b66ce3d9c75d4a39b5336dcdf9929411@boeing.com> <0DDEBA6C-3933-40FC-BB9C-33FA59DC9D76@cisco.com> <4907a159683346789bef5c495f03f95d@boeing.com> <b5043a5446914cb5b12ed76401359c7e@boeing.com> <3978163f-8815-1bd4-0fda-d84df9cbe684@gont.com.ar> <6b0d6c0a790b46c893b0ff3051599fb4@boeing.com> <85d89256-a495-d779-2c7c-2573bfae36c5@gont.com.ar> <ce2150de-9ff2-d66a-ab18-4f3b18ca6237@hit.bme.hu> <02d2c251ce2f45d388725d11ebd85a6f@boeing.com>
To: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/wJ06j9HDLk8IM8eEaj-37Owm9Uw>
Subject: Re: [v6ops] Off topic: Teredo sunset -- Re: [EXTERNAL] Re: Improving ND security
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Aug 2020 22:52:53 -0000


> On Aug 3, 2020, at 3:24 PM, Templin (US), Fred L <Fred.L.Templin@boeing.com> wrote:
> 
> Perhaps gone, but not forgotten - RFC4380 is still a proposed standard and
> specifies a UDP/IP encapsulation format that can be adopted by other service
> specifications. The other services are easily distinguished from Teredo through
> the use of a service-specific IANA-assigned UDP port number.

Thanks for the segue. Fred brought this issue to my attention recently and we addressed it in a presentation at TSVWG last week on UDP options.

RFC4380 makes some claims about “consistency” between UDP length and IP length - without defining the term. *IF* that means that the two point to the same “end of packet”, then it would prohibit use of UDP options as they’re now being defined.

RFC6081 goes further and tries to explicitly define “consistency” as per above (which it should not - esp. because it never updated RFC 768 or RFC 1122 accordingly) *AND* introduces another variant where the IP length undershoots the UDP length “end”, which is nonsensical esp. because it would interact badly with IP devices (which couldn’t forward the UDP overshoot without parsing into the UDP packet to process IP).

This will be discussed in the pending updated UDP options text, but the intent is to correct these errors (i.e., UDP length can “undershoot” the IP length, which is where UDP options go, and can never overshoot as per RFC6081).

FYI.

Joe